Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 03 May 1997 02:57:31 -0500
From:      "Jeffrey J. Mountin" <sysop@mixcom.com>
To:        "Daniel O'Callaghan" <danny@panda.hilink.com.au>
Cc:        FreeBSD-Hackers@FreeBSD.ORG
Subject:   Re: SPAM target
Message-ID:  <3.0.32.19970503025730.00b0b99c@mixcom.com>

next in thread | raw e-mail | index | archive | help
At 03:48 PM 5/3/97 +1000, Daniel O'Callaghan wrote:
>Only until the rats learn the new maze - all they have to do there is to 
>give a real domain with a fake user.  e.g. nobody@lon3.melbourne.telstra.net.

They do this already.

>So then you teach sendmail to attempt to verify the user in the From:
>
>MAIL FROM: <danny@hilink.com.au>
>{hang on a tick, connect hilink.com.au, HELO, MAIL FROM: <sendmail@here>, 
>RCPT TO: <danny@hilink.com.au>, 250 RCPT OK, QUIT}
>Now, what were you saying...
>
>So then they take the first bunny in the list of spam addresses and make 
>him the apparent sender. :-(

If you allow vrfy that is.  Also need to block receipts too.

Hmmm.... have to look, such a check could be built in to our proxy.

>The only real solution is the removal of SMTP and a new MTP which 
>requires everyone in the world to have a signing certificate from a 
>recognised CA.

Yes this would be good... don't know a whole lot about IPv6, but isn't this
problem addressed?

Along with "proper" setup of services.


-------------------------------------------
Jeff Mountin - System/Network Administrator
jeff@mixcom.net

MIX Communications
Serving the Internet since 1990



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.32.19970503025730.00b0b99c>